EP1679925A1 - Authentication of a mobile station - Google Patents
Authentication of a mobile station Download PDFInfo
- Publication number
- EP1679925A1 EP1679925A1 EP06000214A EP06000214A EP1679925A1 EP 1679925 A1 EP1679925 A1 EP 1679925A1 EP 06000214 A EP06000214 A EP 06000214A EP 06000214 A EP06000214 A EP 06000214A EP 1679925 A1 EP1679925 A1 EP 1679925A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- authentication
- mobile station
- flag
- state
- fail
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
Definitions
- the present invention relates generally to a mobile station and, more particularly, to authentication of a mobile station.
- Authentication of a mobile station is processed by information exchange between a base station (e.g., a wireless network) and a mobile station to verify the identity of the mobile station.
- a base station e.g., a wireless network
- the mobile station performs registration authentication. If the registration authentication is successful, the wireless network transmits an authentication success message to the mobile station.
- the mobile station may thus be normally operated.
- An authorized (e.g., legally produced) mobile station should be successfully authenticated.
- An unauthorized (e.g., illegally duplicated) mobile station uses an electronic serial number (ESN) and an authentication key of the authorized mobile station to access the wireless network.
- ESN electronic serial number
- the authorized mobile station and the unauthorized mobile station both attempt registration authentication.
- the wireless network then transmits an authentication fail message to the unauthorized mobile station and the authorized mobile station.
- the authentication fail message may be a lock order message which locks both the unauthorized mobile station and the authorized mobile station, preventing further wireless communications by either mobile station.
- the present invention is directed to authentication of a mobile station that substantially obviates one or more problems due to limitations and disadvantages of the related art.
- An object of the present invention is to provide authentication of a mobile station, such that an authorized mobile station may maintain normal operation, despite attempts by an unauthorized mobile station to gain authentication using identifiers belonging to the authorized mobile station.
- a method for processing authentication of a mobile station in a mobile communication system comprises determining whether an authentication state is inactivated, and requesting registration. The method also comprises receiving a result message from a network, and activating the authentication state according to the result message.
- the authentication state may be checked using a success flag or a fail flag.
- the success flag may be activated when the result message is a success message.
- the fail flag may be activated when the result message is a fail message.
- the activating the authentication state may comprise activating an authentication success state in response to activation of the success flag, and activating an authentication fail state in response to activation of the fail flag.
- the method may further comprise entering a lock state when the authentication state is activated as an authentication fail state.
- a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication result message, and identifying whether an authentication flag is activated. The method also comprises determining processing operation of the authentication result message based on the activated authentication flag.
- the determining processing operation may comprise ignoring the authentication result message when the activated authentication flag is a success flag, and entering a lock state when the activated authentication flag is a fail flag.
- a mobile station under normal operation may ignore the authentication result message.
- a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication message from a network that sets an authentication flag as an authentication success flag, if an authentication attempt is successfully processed.
- the method also comprises receiving an authentication message from the network that sets the authentication flag as an authentication fail flag, if the authentication attempt fails.
- the method also comprises operating, according to an authentication determination by the network, based on a status of the authentication flag.
- the method may further comprise storing the authentication flag in a memory. Authentication may be attempted with the network upon application of power. The method may further comprise entering a lock state when the authentication attempt is denied by the network. The method may further comprise entering a power down state when the authentication attempt is denied by the network.
- the term 'mobile station' encompasses mobile phones, handsets, PDAs (personal digital assistants), and computers, as well as any other devices with wireless communication capabilities.
- the mobile station may include a processor, a display, and an antenna, for example.
- the processor may be configured to perform techniques and/or steps described herein. Authentication of a mobile station is described below.
- a registration authentication success flag and/or a registration authentication fail flag may be set in a memory of a mobile station.
- the mobile station determines whether to attempt registration authentication based on the state of the registration authentication fail flag. If the mobile station is unauthorized (e.g., illegally duplicated), repeated registration authentication attempts by repeated power off/on actions in the unauthorized mobile station are prevented, thereby preventing load increase on the wireless network authentication system. Furthermore, when power is applied to the authorized mobile station and registration authentication is attempted, if the authorized mobile station receives an authentication fail message caused by registration authentication failure of the unauthorized mobile station, the authorized mobile station ignores the authentication fail message and maintains a normal operation state.
- the mobile station when power is applied to a mobile station having an authentication key (e.g., A-key) and an electronic serial number (e.g., ESN), the mobile station attempts registration authentication.
- the mobile station and the wireless network perform an update procedure of shared secret data (e.g., SSD).
- shared secret data e.g., SSD
- the SSD updated by the mobile station and the SSD updated by the wireless network are matching, the registration authentication succeeds.
- the mobile station uses the newly-updated SSD for voice privacy and message encryption.
- the SSD is divided into SSD_A and SSD_B, for example.
- the SSD_A is used to support the authentication procedure
- the SSD_B is used to support the voice privacy and the message encryption.
- Fig. 1 is a flow diagram illustrating a method for updating shared secret data (SSD).
- the wireless network transmits an SSD update message including a random number (e.g., RAND_SSD) to the mobile station.
- An SSD update procedure is thereby started.
- the mobile station When receiving the SSD update message including the random number RAND_SSD, the mobile station initializes stored SSD_A and SSD_B. Thereafter, the mobile station inputs the initialized SSD_A, the received random number RAND_SSD, the A-key, an ESN and a mobile identification number (e.g., MIN) to a first authentication algorithm (e.g., SSD generation procedure), thereby processing a first authentication.
- the mobile station generates new SSD, e.g. SSD_A_NEW and SSD_B_NEW, by the first authentication.
- the mobile station then generates a random number (e.g., RANDBS) by a random number generation function, and transmits the generated random number RANDBS to the wireless network through a base station challenge order.
- a random number e.g., RANDBS
- Fig. 2 is a flow diagram illustrating a method for generating new authentication information for a mobile station.
- the mobile station inputs the random number RANDBS to a RAND_CHALLENGE parameter, for example, the SSD_A_NEW to an SSD_AUTH parameter, for example, the ESN to an ESN parameter, for example, and the MIN to an AUTH_DATA parameter, for example, thereby processing secondary authentication by a secondary authentication algorithm (e.g., Auth_Signature procedure).
- the mobile station generates new authentication information (e.g., first AUTHBS) by the secondary authentication.
- the wireless network after transmitting the SSD update message including the random number RAND_SSD to the mobile station, initializes the stored SSD_A and SSD_B, and inputs the initialized SSD_A, the transmitted random number RAND_SSD, the A-key of the mobile station, the ESN of the mobile station and the MIN of the mobile station to a first authentication algorithm, thereby processing the first authentication.
- the wireless network generates new SSD, e.g., SSD_A_NEW and SSD_B_NEW, by the first authentication.
- the wireless network inputs the random number RANDBS transmitted from the mobile station through the base station challenge order, the SSD_A_NEW, the ESN of the mobile station and the MIN of the mobile station to a second authentication algorithm, thereby processing the second authentication.
- the wireless network generates new authentication information (e.g., second AUTHBS) by the secondary authentication.
- the first and second authentication algorithms of the mobile station may be the same as the first and second authentication algorithms of the wireless network.
- the wireless network transmits the second authentication information (e.g., second AUTHBS) generated by the second authentication to the mobile station.
- the mobile station compares the second authentication information transmitted from the wireless network against the first authentication information generated by the mobile station. When the first authentication information matches the second authentication information, the mobile station determines that SSD update has succeeded, and notifies SSD update success to the wireless network through an SSD update confirmation order, for example. However, when the first authentication information differs from the second authentication information, the mobile station determines that SSD update has failed, and notifies SSD update failure to the wireless network through an SSD update rejection order.
- second authentication information e.g., second AUTHBS
- the wireless network When receiving the SSD update confirmation order from the mobile station, the wireless network updates the SSD_A and SSD_B with the SSD_A_NEW and SSD_B_NEW, and transmits an authentication result message notifying registration authentication success to the mobile station. After successfully processing the SSD update and the registration authentication, the mobile station uses the updated SSD_B_NEW for call access services such as voice privacy and message encryption. However, when receiving the SSD update rejection order from the mobile station, the wireless network ignores the SSD_A_NEW and SSD_B_NEW, does not update the SSD_A and SSD_B, and transmits an authentication result message notifying registration authentication failure to the mobile station.
- Authentication of an authorized mobile station and an unauthorized mobile station is described below with reference to Fig. 3, where the authorized mobile station is normally operated according to registration authentication success and the unauthorized mobile station attempts registration authentication.
- Fig. 3 is a flow diagram illustrating a method for processing authentication of a mobile station, according to an embodiment of the present invention.
- the mobile station upon receiving power (S11), the mobile station confirms a state of a registration authentication fail flag (S12). When the registration authentication fail flag has not been activated, the mobile station processes the registration authentication with the wireless network (S13).
- the registration authentication succeeds. An authentication success message is then transmitted from the wireless network as a registration authentication result.
- the registration authentication fails, and an authentication fail message is transmitted from the wireless network as a registration authentication result.
- the authorized mobile station may thus be normally operated based on the registration authentication success.
- the unauthorized mobile station is rejected for registration authentication by the wireless network, and the wireless network transmits an authentication fail message.
- the authentication fail message may have a special value, such as 'power down', for example.
- the mobile station determines that the registration authentication has succeeded (S14), sets a registration authentication success flag in an active state (S15), and enters a normal operation state to perform call access services.
- the mobile station determines that the registration authentication has failed (S14), sets a registration authentication fail flag in an active state (S16), and enters an abnormal operation state such as a lock state or power down state (S17).
- step S12 when the registration authentication fail flag has been activated, the mobile station may directly enter the lock state without processing the registration authentication (S18). Accordingly, in the case an unauthorized (e.g., illegally duplicated) mobile station, when power is repeatedly applied to the illegally duplicated mobile station, the wireless network authentication system does not repeatedly process the registration authentication, thereby conserving wireless network authentication resources.
- an unauthorized (e.g., illegally duplicated) mobile station when power is repeatedly applied to the illegally duplicated mobile station, the wireless network authentication system does not repeatedly process the registration authentication, thereby conserving wireless network authentication resources.
- Fig. 4 is a flow diagram illustrating a method for processing, in an authenticated mobile station, an authentication fail message resulting from registration authentication failure of an unauthorized mobile station, according to an embodiment of the present invention.
- the mobile station upon application of power to a mobile station and receipt of an authentication result message (S21), the mobile station checks a state of a registration authentication success flag stored in a memory (S22). If the registration authentication success flag has been activated, the mobile station ignores the received authentication result message and maintains the normal operation state (S23). However, if the registration authentication success flag is not inactivated, the mobile station checks whether the registration authentication fail flag is in the active state (S24). When the registration authentication fail flag is in the inactive state, the mobile station is operated according to the authentication result message (S26). The authorized mobile station is thus prevented from being abnormally operated by the authentication failure of the unauthorized mobile station.
- the authorized mobile station While the unauthorized mobile station maintains the lock state, the authorized mobile station is turned off and on. If the authentication success message from registration authentication success of the authorized mobile station is transmitted to the unauthorized mobile station (S21), the unauthorized mobile station checks whether the registration authentication success flag is in the active state. When the registration authentication success flag is in the inactive state (S22), the unauthorized mobile station checks whether the registration authentication fail flag is in the active state (S24). When the registration authentication fail flag is in the active state, the unauthorized mobile station ignores the received authentication success message, and enters the lock state (S25). Accordingly, the unauthorized mobile station is prevented from being normally operated by the authentication success of the authorized mobile station.
- the registration authentication success flag and the registration authentication fail flag may be set in a memory of the mobile station.
- a registration authentication success the mobile station sets the registration authentication success flag in the active state.
- a registration authentication failure the mobile station sets the registration authentication fail flag in the active state.
- the mobile station checks the state of the registration authentication fail flag.
- the registration authentication fail flag is in the active state, the mobile station may directly enter the abnormal operation state without attempting the registration authentication. As a result, the load increase of the wireless network authentication system is prevented by preventing repeated processing of the registration authentication when power is repeatedly applied to the unauthorized mobile station.
- the authorized mobile station checks the state of the registration authentication success flag.
- the registration authentication success flag is in the active state, the authorized mobile station ignores the received authentication fail message and maintains the normal operation state. Accordingly, the authorized mobile station is not affected by the registration authentication failure of the unauthorized mobile station.
- a method for processing authentication of a mobile station in a mobile communication system comprises determining whether an authentication state is inactivated, and requesting registration. The method also comprises receiving a result message from a network, and activating the authentication state according to the result message.
- the authentication state may be checked using a success flag or a fail flag.
- the success flag may be activated when the result message is a success message.
- the fail flag may be activated when the result message is a fail message.
- the activating the authentication state may comprise activating an authentication success state in response to activation of the success flag, and activating an authentication fail state in response to activation of the fail flag.
- the method may further comprise entering a lock state when the authentication state is activated as an authentication fail state.
- a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication result message, and identifying whether an authentication flag is activated. The method also comprises determining processing operation of the authentication result message based on the activated authentication flag.
- the determining processing operation may comprise ignoring the authentication result message when the activated authentication flag is a success flag, and entering a lock state when the activated authentication flag is a fail flag.
- a mobile station under normal operation may ignore the authentication result message.
- a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication message from a network that sets an authentication flag as an authentication success flag, if an authentication attempt is successfully processed.
- the method also comprises receiving an authentication message from the network that sets the authentication flag as an authentication fail flag, if the authentication attempt fails.
- the method also comprises operating, according to an authentication determination by the network, based on a status of the authentication flag.
- the method may further comprise storing the authentication flag in a memory. Authentication may be attempted with the network upon application of power. The method may further comprise entering a lock state when the authentication attempt is denied by the network. The method may further comprise entering a power down state when the authentication attempt is denied by the network.
- the present invention may provide a method for processing authentication of an illegally duplicated mobile station in a mobile communication system which may continuously maintain a normal operation state of a normally registered and authenticated mobile station regardless of authentication failure of the illegally duplicated mobile station, by forming a registration authentication success flag in a memory of the mobile station, and making the mobile station set the registration authentication success flag in an active state when successfully processing registration authentication, and ignoring an authentication fail message resulting from registration authentication failure of the illegally duplicated mobile station on the basis of the active state of the registration authentication success flag when receiving the authentication fail message in the power application state.
- the present invention may also provide a method for processing authentication of an illegally duplicated mobile station in a mobile communication system which may prevent repeated processing of authentication registration of a wireless network and load increase by preventing repeated attempts to registration authentication of an illegally duplicated mobile station when the illegally duplicated mobile station is repeatedly powered off and on, by forming a registration authentication fail flag in a memory of a mobile station, and making the mobile station check the state of the registration authentication fail flag in every power application state, attempt registration authentication when the registration authentication fail flag has been inactivated, and directly enter an abnormal operation state without attempting registration authentication when the registration authentication fail flag has been activated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- The present invention relates generally to a mobile station and, more particularly, to authentication of a mobile station.
- Authentication of a mobile station is processed by information exchange between a base station (e.g., a wireless network) and a mobile station to verify the identity of the mobile station.
- In a power-on mode, the mobile station performs registration authentication. If the registration authentication is successful, the wireless network transmits an authentication success message to the mobile station. The mobile station may thus be normally operated.
- An authorized (e.g., legally produced) mobile station should be successfully authenticated. An unauthorized (e.g., illegally duplicated) mobile station uses an electronic serial number (ESN) and an authentication key of the authorized mobile station to access the wireless network. The authorized mobile station and the unauthorized mobile station both attempt registration authentication. The wireless network then transmits an authentication fail message to the unauthorized mobile station and the authorized mobile station. The authentication fail message may be a lock order message which locks both the unauthorized mobile station and the authorized mobile station, preventing further wireless communications by either mobile station.
- Therefore, conventional authentication techniques undesirably lock the authorized mobile station. Furthermore, due to repeated attempts by the authorized mobile station to gain authentication, the load on the wireless network authentication system increases.
- Accordingly, the present invention is directed to authentication of a mobile station that substantially obviates one or more problems due to limitations and disadvantages of the related art.
- An object of the present invention is to provide authentication of a mobile station, such that an authorized mobile station may maintain normal operation, despite attempts by an unauthorized mobile station to gain authentication using identifiers belonging to the authorized mobile station.
- Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
- To achieve these objects and other advantages and in accordance with the purpose of the invention, as embodied and broadly described herein, in one embodiment, a method for processing authentication of a mobile station in a mobile communication system comprises determining whether an authentication state is inactivated, and requesting registration. The method also comprises receiving a result message from a network, and activating the authentication state according to the result message.
- The authentication state may be checked using a success flag or a fail flag. The success flag may be activated when the result message is a success message. The fail flag may be activated when the result message is a fail message. The activating the authentication state may comprise activating an authentication success state in response to activation of the success flag, and activating an authentication fail state in response to activation of the fail flag. The method may further comprise entering a lock state when the authentication state is activated as an authentication fail state.
- In another embodiment, a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication result message, and identifying whether an authentication flag is activated. The method also comprises determining processing operation of the authentication result message based on the activated authentication flag.
- The determining processing operation may comprise ignoring the authentication result message when the activated authentication flag is a success flag, and entering a lock state when the activated authentication flag is a fail flag. A mobile station under normal operation may ignore the authentication result message.
- In yet another embodiment, a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication message from a network that sets an authentication flag as an authentication success flag, if an authentication attempt is successfully processed. The method also comprises receiving an authentication message from the network that sets the authentication flag as an authentication fail flag, if the authentication attempt fails. The method also comprises operating, according to an authentication determination by the network, based on a status of the authentication flag.
- The method may further comprise storing the authentication flag in a memory. Authentication may be attempted with the network upon application of power. The method may further comprise entering a lock state when the authentication attempt is denied by the network. The method may further comprise entering a power down state when the authentication attempt is denied by the network.
- The foregoing and other objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of the present invention when taken in conjunction with the accompanying drawings. It is to be understood that both the foregoing general description and the following detailed description of the present invention are exemplary and explanatory and are intended to provide further explanation of the invention as claimed.
- The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention.
- Fig. 1 is a flow diagram illustrating a method for updating shared secret data (SSD).
- Fig. 2 is a flow diagram illustrating a method for generating new authentication information for a mobile station.
- Fig. 3 is a flow diagram illustrating a method for processing authentication of a mobile station, according to an embodiment of the present invention.
- Fig. 4 is a flow diagram illustrating a method for processing, in an authenticated mobile station, an authentication fail message resulting from registration authentication failure of an unauthorized mobile station, according to an embodiment of the present invention.
- Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
- The term 'mobile station' encompasses mobile phones, handsets, PDAs (personal digital assistants), and computers, as well as any other devices with wireless communication capabilities. The mobile station may include a processor, a display, and an antenna, for example. The processor may be configured to perform techniques and/or steps described herein. Authentication of a mobile station is described below.
- A registration authentication success flag and/or a registration authentication fail flag may be set in a memory of a mobile station. The mobile station determines whether to attempt registration authentication based on the state of the registration authentication fail flag. If the mobile station is unauthorized (e.g., illegally duplicated), repeated registration authentication attempts by repeated power off/on actions in the unauthorized mobile station are prevented, thereby preventing load increase on the wireless network authentication system. Furthermore, when power is applied to the authorized mobile station and registration authentication is attempted, if the authorized mobile station receives an authentication fail message caused by registration authentication failure of the unauthorized mobile station, the authorized mobile station ignores the authentication fail message and maintains a normal operation state.
- In an exemplary authentication process, when power is applied to a mobile station having an authentication key (e.g., A-key) and an electronic serial number (e.g., ESN), the mobile station attempts registration authentication. In the registration authentication, the mobile station and the wireless network perform an update procedure of shared secret data (e.g., SSD). When the SSD updated by the mobile station and the SSD updated by the wireless network are matching, the registration authentication succeeds. The mobile station then uses the newly-updated SSD for voice privacy and message encryption. The SSD is divided into SSD_A and SSD_B, for example. The SSD_A is used to support the authentication procedure, and the SSD_B is used to support the voice privacy and the message encryption.
- Fig. 1 is a flow diagram illustrating a method for updating shared secret data (SSD).
- Referring to Fig. 1, when a mobile station attempts registration authentication, the wireless network transmits an SSD update message including a random number (e.g., RAND_SSD) to the mobile station. An SSD update procedure is thereby started.
- When receiving the SSD update message including the random number RAND_SSD, the mobile station initializes stored SSD_A and SSD_B. Thereafter, the mobile station inputs the initialized SSD_A, the received random number RAND_SSD, the A-key, an ESN and a mobile identification number (e.g., MIN) to a first authentication algorithm (e.g., SSD generation procedure), thereby processing a first authentication. The mobile station generates new SSD, e.g. SSD_A_NEW and SSD_B_NEW, by the first authentication. The mobile station then generates a random number (e.g., RANDBS) by a random number generation function, and transmits the generated random number RANDBS to the wireless network through a base station challenge order. It shall be understood that the present invention is not limited to SSD, but may utilize any appropriate authentication technology.
- Fig. 2 is a flow diagram illustrating a method for generating new authentication information for a mobile station.
- Referring to Fig. 2, the mobile station inputs the random number RANDBS to a RAND_CHALLENGE parameter, for example, the SSD_A_NEW to an SSD_AUTH parameter, for example, the ESN to an ESN parameter, for example, and the MIN to an AUTH_DATA parameter, for example, thereby processing secondary authentication by a secondary authentication algorithm (e.g., Auth_Signature procedure). The mobile station generates new authentication information (e.g., first AUTHBS) by the secondary authentication.
- The wireless network, after transmitting the SSD update message including the random number RAND_SSD to the mobile station, initializes the stored SSD_A and SSD_B, and inputs the initialized SSD_A, the transmitted random number RAND_SSD, the A-key of the mobile station, the ESN of the mobile station and the MIN of the mobile station to a first authentication algorithm, thereby processing the first authentication. The wireless network generates new SSD, e.g., SSD_A_NEW and SSD_B_NEW, by the first authentication.
- Thereafter, the wireless network inputs the random number RANDBS transmitted from the mobile station through the base station challenge order, the SSD_A_NEW, the ESN of the mobile station and the MIN of the mobile station to a second authentication algorithm, thereby processing the second authentication. The wireless network generates new authentication information (e.g., second AUTHBS) by the secondary authentication. The first and second authentication algorithms of the mobile station may be the same as the first and second authentication algorithms of the wireless network.
- The wireless network transmits the second authentication information (e.g., second AUTHBS) generated by the second authentication to the mobile station. The mobile station compares the second authentication information transmitted from the wireless network against the first authentication information generated by the mobile station. When the first authentication information matches the second authentication information, the mobile station determines that SSD update has succeeded, and notifies SSD update success to the wireless network through an SSD update confirmation order, for example. However, when the first authentication information differs from the second authentication information, the mobile station determines that SSD update has failed, and notifies SSD update failure to the wireless network through an SSD update rejection order.
- When receiving the SSD update confirmation order from the mobile station, the wireless network updates the SSD_A and SSD_B with the SSD_A_NEW and SSD_B_NEW, and transmits an authentication result message notifying registration authentication success to the mobile station. After successfully processing the SSD update and the registration authentication, the mobile station uses the updated SSD_B_NEW for call access services such as voice privacy and message encryption. However, when receiving the SSD update rejection order from the mobile station, the wireless network ignores the SSD_A_NEW and SSD_B_NEW, does not update the SSD_A and SSD_B, and transmits an authentication result message notifying registration authentication failure to the mobile station.
- Authentication of an authorized mobile station and an unauthorized mobile station is described below with reference to Fig. 3, where the authorized mobile station is normally operated according to registration authentication success and the unauthorized mobile station attempts registration authentication.
- Fig. 3 is a flow diagram illustrating a method for processing authentication of a mobile station, according to an embodiment of the present invention.
- Referring to Fig. 3, upon receiving power (S11), the mobile station confirms a state of a registration authentication fail flag (S12). When the registration authentication fail flag has not been activated, the mobile station processes the registration authentication with the wireless network (S13).
- When the mobile station is authorized, the registration authentication succeeds. An authentication success message is then transmitted from the wireless network as a registration authentication result. However, when the mobile station is unauthorized, the registration authentication fails, and an authentication fail message is transmitted from the wireless network as a registration authentication result. The authorized mobile station may thus be normally operated based on the registration authentication success. However, the unauthorized mobile station is rejected for registration authentication by the wireless network, and the wireless network transmits an authentication fail message. The authentication fail message may have a special value, such as 'power down', for example.
- When the authentication result message from the wireless network is an authentication success message, the mobile station determines that the registration authentication has succeeded (S14), sets a registration authentication success flag in an active state (S15), and enters a normal operation state to perform call access services.
- However, when the authentication result message from the wireless network is an authentication fail message, the mobile station determines that the registration authentication has failed (S14), sets a registration authentication fail flag in an active state (S16), and enters an abnormal operation state such as a lock state or power down state (S17).
- However, referring to step S12, when the registration authentication fail flag has been activated, the mobile station may directly enter the lock state without processing the registration authentication (S18). Accordingly, in the case an unauthorized (e.g., illegally duplicated) mobile station, when power is repeatedly applied to the illegally duplicated mobile station, the wireless network authentication system does not repeatedly process the registration authentication, thereby conserving wireless network authentication resources.
- Authentication where the authorized mobile station receives an authentication failure message caused by an authentication registration attempt by the unauthorized mobile station is described below with respect to Fig. 4.
- Fig. 4 is a flow diagram illustrating a method for processing, in an authenticated mobile station, an authentication fail message resulting from registration authentication failure of an unauthorized mobile station, according to an embodiment of the present invention.
- Referring to Fig. 4, upon application of power to a mobile station and receipt of an authentication result message (S21), the mobile station checks a state of a registration authentication success flag stored in a memory (S22). If the registration authentication success flag has been activated, the mobile station ignores the received authentication result message and maintains the normal operation state (S23). However, if the registration authentication success flag is not inactivated, the mobile station checks whether the registration authentication fail flag is in the active state (S24). When the registration authentication fail flag is in the inactive state, the mobile station is operated according to the authentication result message (S26). The authorized mobile station is thus prevented from being abnormally operated by the authentication failure of the unauthorized mobile station.
- The method for processing the unauthorized mobile station in a state where the registration authentication success message of the authorized mobile station is transmitted to the unauthorized mobile station (in lock state) is described below with reference to Fig. 4.
- While the unauthorized mobile station maintains the lock state, the authorized mobile station is turned off and on. If the authentication success message from registration authentication success of the authorized mobile station is transmitted to the unauthorized mobile station (S21), the unauthorized mobile station checks whether the registration authentication success flag is in the active state. When the registration authentication success flag is in the inactive state (S22), the unauthorized mobile station checks whether the registration authentication fail flag is in the active state (S24). When the registration authentication fail flag is in the active state, the unauthorized mobile station ignores the received authentication success message, and enters the lock state (S25). Accordingly, the unauthorized mobile station is prevented from being normally operated by the authentication success of the authorized mobile station.
- As discussed above, the registration authentication success flag and the registration authentication fail flag may be set in a memory of the mobile station. In a registration authentication success, the mobile station sets the registration authentication success flag in the active state. In a registration authentication failure, the mobile station sets the registration authentication fail flag in the active state. When power is applied, the mobile station checks the state of the registration authentication fail flag. When the registration authentication fail flag is in the active state, the mobile station may directly enter the abnormal operation state without attempting the registration authentication. As a result, the load increase of the wireless network authentication system is prevented by preventing repeated processing of the registration authentication when power is repeatedly applied to the unauthorized mobile station.
- Furthermore, when the registration authentication of the authorized mobile station succeeds and the authorized mobile station is normally operated, if the authorized mobile station receives the authentication fail message caused by the registration authentication failure of the unauthorized mobile station, the authorized mobile station checks the state of the registration authentication success flag. When the registration authentication success flag is in the active state, the authorized mobile station ignores the received authentication fail message and maintains the normal operation state. Accordingly, the authorized mobile station is not affected by the registration authentication failure of the unauthorized mobile station.
- In one embodiment, a method for processing authentication of a mobile station in a mobile communication system comprises determining whether an authentication state is inactivated, and requesting registration. The method also comprises receiving a result message from a network, and activating the authentication state according to the result message.
- The authentication state may be checked using a success flag or a fail flag. The success flag may be activated when the result message is a success message. The fail flag may be activated when the result message is a fail message. The activating the authentication state may comprise activating an authentication success state in response to activation of the success flag, and activating an authentication fail state in response to activation of the fail flag. The method may further comprise entering a lock state when the authentication state is activated as an authentication fail state.
- In another embodiment, a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication result message, and identifying whether an authentication flag is activated. The method also comprises determining processing operation of the authentication result message based on the activated authentication flag.
- The determining processing operation may comprise ignoring the authentication result message when the activated authentication flag is a success flag, and entering a lock state when the activated authentication flag is a fail flag. A mobile station under normal operation may ignore the authentication result message.
- In yet another embodiment, a method for processing authentication of a mobile station in a mobile communication system comprises receiving an authentication message from a network that sets an authentication flag as an authentication success flag, if an authentication attempt is successfully processed. The method also comprises receiving an authentication message from the network that sets the authentication flag as an authentication fail flag, if the authentication attempt fails. The method also comprises operating, according to an authentication determination by the network, based on a status of the authentication flag.
- The method may further comprise storing the authentication flag in a memory. Authentication may be attempted with the network upon application of power. The method may further comprise entering a lock state when the authentication attempt is denied by the network. The method may further comprise entering a power down state when the authentication attempt is denied by the network.
- The present invention may provide a method for processing authentication of an illegally duplicated mobile station in a mobile communication system which may continuously maintain a normal operation state of a normally registered and authenticated mobile station regardless of authentication failure of the illegally duplicated mobile station, by forming a registration authentication success flag in a memory of the mobile station, and making the mobile station set the registration authentication success flag in an active state when successfully processing registration authentication, and ignoring an authentication fail message resulting from registration authentication failure of the illegally duplicated mobile station on the basis of the active state of the registration authentication success flag when receiving the authentication fail message in the power application state.
- The present invention may also provide a method for processing authentication of an illegally duplicated mobile station in a mobile communication system which may prevent repeated processing of authentication registration of a wireless network and load increase by preventing repeated attempts to registration authentication of an illegally duplicated mobile station when the illegally duplicated mobile station is repeatedly powered off and on, by forming a registration authentication fail flag in a memory of a mobile station, and making the mobile station check the state of the registration authentication fail flag in every power application state, attempt registration authentication when the registration authentication fail flag has been inactivated, and directly enter an abnormal operation state without attempting registration authentication when the registration authentication fail flag has been activated.
- It will be apparent to those skilled in the art that various modifications and variations may be made in the present invention without departing from the spirit or scope of the inventions. Thus, it is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents.
Claims (20)
- A method for processing authentication of a mobile station in a mobile communication system, the method comprising:determining whether an authentication state is inactivated;requesting registration;receiving a result message from a network; andactivating the authentication state according to the result message.
- The method of claim 1, wherein the authentication state is checked using a success flag or a fail flag.
- The method of claim 2, wherein the success flag is activated when the result message is a success message.
- The method of claim 2, wherein the fail flag is activated when the result message is a fail message.
- The method of claim 1, wherein the activating the authentication state comprises:activating an authentication success state in response to activation of the success flag; andactivating an authentication fail state in response to activation of the fail flag.
- The method of claim 1, further comprising:entering a lock state when the authentication state is activated as an authentication fail state.
- A method for processing authentication of a mobile station in a mobile communication system, the method comprising:receiving an authentication result message;identifying whether an authentication flag is activated; anddetermining processing operation of the authentication result message based on the activated authentication flag.
- The method of claim 7, wherein the determining processing operation comprises:ignoring the authentication result message when the activated authentication flag is a success flag; andentering a lock state when the activated authentication flag is a fail flag.
- The method of claim 8, wherein a mobile station under normal operation ignores the authentication result message.
- A method for processing authentication of a mobile station in a mobile communication system, the method comprising:receiving an authentication message from a network that sets an authentication flag as an authentication success flag, if an authentication attempt is successfully processed;receiving an authentication message from the network that sets the authentication flag as an authentication fail flag, if the authentication attempt fails; andoperating, according to an authentication determination by the network, based on a status of the authentication flag.
- The method claim 10, further comprising:storing the authentication flag in a memory.
- The method of claim 10, wherein authentication is attempted with the network upon application of power.
- The method of claim 10, further comprising:entering a lock state when the authentication attempt is denied by the network.
- The method of claim 10, further comprising:entering a power down state when the authentication attempt is denied by the network.
- A mobile station adapted to process authentication in a mobile communication system, the mobile station comprising:means for determining whether an authentication state is inactivated;means for requesting registration;means for receiving a result message from a network; andmeans for activating the authentication state according to the result message.
- The mobile station of claim 15, wherein the authentication state is checked using a success flag or a fail flag.
- The mobile station of claim 16, wherein the success flag is activated when the result message is a success message.
- The mobile station of claim 16, wherein the fail flag is activated when the result message is a fail message.
- The mobile station of claim 15, wherein the means for activating the authentication state comprises:means for activating an authentication success state in response to activation of the success flag; andmeans for activating an authentication fail state in response to activation of the fail flag.
- The mobile station of claim 15, further comprising:means for entering a lock state when the authentication state is activated as an authentication fail state.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020050001753A KR100619980B1 (en) | 2005-01-07 | 2005-01-07 | Method for processing authentication of illegal duplicated mobile terminal in mobile communication system |
KR1020050001752A KR100619979B1 (en) | 2005-01-07 | 2005-01-07 | Method for processing authentication failure of illegal duplicated mobile terminal in normal mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1679925A1 true EP1679925A1 (en) | 2006-07-12 |
EP1679925B1 EP1679925B1 (en) | 2017-04-05 |
Family
ID=36095852
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06000214.4A Not-in-force EP1679925B1 (en) | 2005-01-07 | 2006-01-05 | Authentication of a mobile station |
Country Status (3)
Country | Link |
---|---|
US (1) | US7711352B2 (en) |
EP (1) | EP1679925B1 (en) |
JP (1) | JP4173889B2 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1944986A2 (en) | 2007-01-07 | 2008-07-16 | Apple Inc. | Mobile device activation |
US7929959B2 (en) | 2007-09-01 | 2011-04-19 | Apple Inc. | Service provider activation |
US8032181B2 (en) | 2007-09-01 | 2011-10-04 | Apple Inc. | Service provider activation with subscriber identity module policy |
US20120096162A1 (en) * | 2009-07-09 | 2012-04-19 | Fernando Cecilia Torralba | Methods and apparatuses for initiating provisioning of subscriber data in a hss of an ip multimedia subsystem network |
US8442521B2 (en) | 2007-09-04 | 2013-05-14 | Apple Inc. | Carrier configuration at activation |
US8555067B2 (en) | 2010-10-28 | 2013-10-08 | Apple Inc. | Methods and apparatus for delivering electronic identification components over a wireless network |
US8666366B2 (en) | 2007-06-22 | 2014-03-04 | Apple Inc. | Device activation and access |
US8855617B2 (en) | 2007-01-07 | 2014-10-07 | Patrice Gautier | Method and system for mobile device activation |
US9451450B2 (en) | 2007-09-01 | 2016-09-20 | Apple Inc. | Postponed carrier configuration |
US9450759B2 (en) | 2011-04-05 | 2016-09-20 | Apple Inc. | Apparatus and methods for controlling distribution of electronic access clients |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163309B (en) | 2006-10-13 | 2012-07-04 | 华为技术有限公司 | Method, system and device for implementing information locking |
US8769308B2 (en) * | 2007-04-30 | 2014-07-01 | Interdigital Technology Corporation | Home (e)Node-B with new functionality |
US20100042841A1 (en) * | 2008-08-15 | 2010-02-18 | Neal King | Updating and Distributing Encryption Keys |
WO2011094869A1 (en) * | 2010-02-05 | 2011-08-11 | Lipso Systèmes Inc. | Secure authentication system and method |
US9251494B2 (en) * | 2010-11-05 | 2016-02-02 | Atc Logistics & Electronics, Inc. | System and method for tracking customer personal information in a warehouse management system |
US10271213B2 (en) | 2011-05-06 | 2019-04-23 | Apple Inc. | Methods and apparatus for providing management capabilities for access control clients |
CN104205906B (en) * | 2012-02-07 | 2019-02-22 | 苹果公司 | The fraud detection apparatus and method of network assistance |
TWI479358B (en) * | 2012-10-11 | 2015-04-01 | Phison Electronics Corp | Data protecting method, mobile communication device and memory storage device |
CN103778073B (en) * | 2012-10-22 | 2016-09-28 | 群联电子股份有限公司 | Data guard method, device for mobile communication and memorizer memory devices |
EP3110189A1 (en) * | 2015-06-25 | 2016-12-28 | Gemalto Sa | A method of replacing at least one authentication parameter for authenticating a security element and corresponding security element |
EP3300417B1 (en) * | 2015-07-07 | 2019-12-11 | Huawei Technologies Co., Ltd. | Method, apparatus and system for detecting anomaly of terminal device |
CN113079500B (en) * | 2019-12-18 | 2023-05-09 | 东莞宇龙通信科技有限公司 | Terminal activation method and device, storage medium and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE36946E (en) * | 1993-11-02 | 2000-11-07 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US20020009199A1 (en) * | 2000-06-30 | 2002-01-24 | Juha Ala-Laurila | Arranging data ciphering in a wireless telecommunication system |
US20020072349A1 (en) * | 1997-09-03 | 2002-06-13 | Geiselman John Milton | Method and apparatus for securing communications |
US20020180583A1 (en) * | 1999-10-19 | 2002-12-05 | Setec Oy | Authentication of subscriber station |
WO2003094562A1 (en) * | 2002-05-03 | 2003-11-13 | Cerebrus Solutions Limited | Local usage monitoring and fraud detection for mobile communication networks |
FR2855895A1 (en) * | 2003-06-06 | 2004-12-10 | Wavecom | Radio communication device e.g. mobile telephone, theft controlling method, involves transmitting confidential code to automatically implement specific operation that avoids usage of device and/or warns third person |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6189099B1 (en) * | 1998-02-11 | 2001-02-13 | Durango Corporation | Notebook security system (NBS) |
US6356753B1 (en) * | 1998-04-24 | 2002-03-12 | Ericsson Inc | Management of authentication and encryption user information in digital user terminals |
US6665530B1 (en) * | 1998-07-31 | 2003-12-16 | Qualcomm Incorporated | System and method for preventing replay attacks in wireless communication |
US7010699B1 (en) | 2000-06-12 | 2006-03-07 | Lucent Technologies Inc | Apparatus, method and system for providing a default mode for authentication failures in mobile telecommunication networks |
JP2004304294A (en) * | 2003-03-28 | 2004-10-28 | Sharp Corp | Mobile terminal and system with personal authentication function |
US7418257B2 (en) * | 2004-08-31 | 2008-08-26 | Pantech & Curitel Communications, Inc. | Mobile communication terminal, wireless data service authentication server, system for automatically blocking voice call connection, and method of processing various messages in mobile communication terminal |
-
2006
- 2006-01-05 JP JP2006000966A patent/JP4173889B2/en not_active Expired - Fee Related
- 2006-01-05 EP EP06000214.4A patent/EP1679925B1/en not_active Not-in-force
- 2006-01-09 US US11/328,784 patent/US7711352B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE36946E (en) * | 1993-11-02 | 2000-11-07 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US20020072349A1 (en) * | 1997-09-03 | 2002-06-13 | Geiselman John Milton | Method and apparatus for securing communications |
US20020180583A1 (en) * | 1999-10-19 | 2002-12-05 | Setec Oy | Authentication of subscriber station |
US20020009199A1 (en) * | 2000-06-30 | 2002-01-24 | Juha Ala-Laurila | Arranging data ciphering in a wireless telecommunication system |
WO2003094562A1 (en) * | 2002-05-03 | 2003-11-13 | Cerebrus Solutions Limited | Local usage monitoring and fraud detection for mobile communication networks |
FR2855895A1 (en) * | 2003-06-06 | 2004-12-10 | Wavecom | Radio communication device e.g. mobile telephone, theft controlling method, involves transmitting confidential code to automatically implement specific operation that avoids usage of device and/or warns third person |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008086255A2 (en) * | 2007-01-07 | 2008-07-17 | Apple Inc. | Mobile device activation |
EP1944986A3 (en) * | 2007-01-07 | 2008-09-03 | Apple Inc. | Mobile device activation |
WO2008086255A3 (en) * | 2007-01-07 | 2009-03-05 | Apple Inc | Mobile device activation |
US10440561B2 (en) | 2007-01-07 | 2019-10-08 | Apple Inc. | Mobile device activation |
EP2317807A1 (en) * | 2007-01-07 | 2011-05-04 | Apple Inc. | Mobile device activation |
EP1944986A2 (en) | 2007-01-07 | 2008-07-16 | Apple Inc. | Mobile device activation |
US8966383B2 (en) | 2007-01-07 | 2015-02-24 | Patrice Gautier | Graphical user interface and method for mobile device activation |
US8855617B2 (en) | 2007-01-07 | 2014-10-07 | Patrice Gautier | Method and system for mobile device activation |
US8849278B2 (en) | 2007-01-07 | 2014-09-30 | Jeffrey Bush | Mobile device activation |
US8666366B2 (en) | 2007-06-22 | 2014-03-04 | Apple Inc. | Device activation and access |
US9451450B2 (en) | 2007-09-01 | 2016-09-20 | Apple Inc. | Postponed carrier configuration |
US7929959B2 (en) | 2007-09-01 | 2011-04-19 | Apple Inc. | Service provider activation |
US8798677B2 (en) | 2007-09-01 | 2014-08-05 | Apple Inc. | Service provider activation |
US8428570B2 (en) | 2007-09-01 | 2013-04-23 | Apple Inc. | Service provider activation |
US8954113B2 (en) | 2007-09-01 | 2015-02-10 | Apple Inc. | Service provider activation with subscriber identity module policy |
US8032181B2 (en) | 2007-09-01 | 2011-10-04 | Apple Inc. | Service provider activation with subscriber identity module policy |
US10645573B2 (en) | 2007-09-01 | 2020-05-05 | Apple Inc. | Postponed carrier configuration |
US9572014B2 (en) | 2007-09-01 | 2017-02-14 | Apple Inc. | Service provider activation with subscriber identity module policy |
US8442521B2 (en) | 2007-09-04 | 2013-05-14 | Apple Inc. | Carrier configuration at activation |
RU2517399C2 (en) * | 2009-07-09 | 2014-05-27 | Телефонактиеболагет Лм Эрикссон (Пабл) | Methods and apparatus for initiating provisioning of subscriber data in hss of ip multimedia subsystem network |
US20120096162A1 (en) * | 2009-07-09 | 2012-04-19 | Fernando Cecilia Torralba | Methods and apparatuses for initiating provisioning of subscriber data in a hss of an ip multimedia subsystem network |
US9479600B2 (en) * | 2009-07-09 | 2016-10-25 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and apparatuses for initiating provisioning of subscriber data in a HSS of an IP multimedia subsystem network |
US9877194B2 (en) | 2010-10-28 | 2018-01-23 | Apple Inc. | Methods and apparatus for delivering electronic identification components over a wireless network |
US8555067B2 (en) | 2010-10-28 | 2013-10-08 | Apple Inc. | Methods and apparatus for delivering electronic identification components over a wireless network |
US10206106B2 (en) | 2010-10-28 | 2019-02-12 | Apple Inc. | Methods and apparatus for delivering electronic identification components over a wireless network |
US9788209B2 (en) | 2011-04-05 | 2017-10-10 | Apple Inc. | Apparatus and methods for controlling distribution of electronic access clients |
US9450759B2 (en) | 2011-04-05 | 2016-09-20 | Apple Inc. | Apparatus and methods for controlling distribution of electronic access clients |
Also Published As
Publication number | Publication date |
---|---|
EP1679925B1 (en) | 2017-04-05 |
JP4173889B2 (en) | 2008-10-29 |
US20060154647A1 (en) | 2006-07-13 |
US7711352B2 (en) | 2010-05-04 |
JP2006191639A (en) | 2006-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7711352B2 (en) | Authentication of mobile station | |
US7088988B2 (en) | Over-the-air subsidy lock resolution | |
US20040046638A1 (en) | Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device | |
EP2018744B1 (en) | Authentication of devices in a wireless network | |
JP4615892B2 (en) | Performing authentication within a communication system | |
EP2345270B1 (en) | Method for providing smart card (sim) security by checking a temporary subscriber identifier (tmsi) | |
JP5189066B2 (en) | User authentication method, authentication system, terminal device and authentication device in terminal device | |
US6374355B1 (en) | Method for securing over-the-air communication in a wireless system | |
US9686399B2 (en) | Protection of a wireless communications device against unauthorized use | |
US8718602B2 (en) | Method and system for remote control of smart card | |
US8931065B2 (en) | OTA bootstrap method and system | |
CN104205906A (en) | Network assisted fraud detection apparatus and method | |
AU6760996A (en) | Method and apparatus for authentication in a communication system | |
JP2003288328A (en) | Security device for portable information apparatus and method therefor | |
KR20100134892A (en) | Method and system for certificating universal subscriber identity module | |
CN1705263B (en) | Validity verification method of mobile terminal user and mobile terminal thereof | |
KR20190056631A (en) | System and method for managing the access of iot device based on hotp | |
CN100518370C (en) | Authentication of mobile station | |
KR100638217B1 (en) | Authentication system for mobile communication terminal and authenticating method | |
JP2010079669A (en) | Radio communication system for security | |
US20190191303A1 (en) | Deployable Cell And Method For Validating A Deployable Cell To Be Fully Operational | |
KR20080034052A (en) | Authentication method using personal identification number | |
KR100619980B1 (en) | Method for processing authentication of illegal duplicated mobile terminal in mobile communication system | |
US20220377061A1 (en) | Accelerated Reconnection in Authenticated Networks | |
JP2003188791A (en) | Mobile communication terminal and control method for mobile communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK YU |
|
17P | Request for examination filed |
Effective date: 20061106 |
|
17Q | First examination report despatched |
Effective date: 20061206 |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602006052158 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04Q0007380000 Ipc: H04W0012060000 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04W 12/12 20090101ALI20160907BHEP Ipc: H04W 12/06 20090101AFI20160907BHEP |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20161025 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: LG ELECTRONICS INC. |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 882834 Country of ref document: AT Kind code of ref document: T Effective date: 20170415 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602006052158 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20170405 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 882834 Country of ref document: AT Kind code of ref document: T Effective date: 20170405 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170706 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170805 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170705 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 13 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602006052158 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20171208 Year of fee payment: 13 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20171206 Year of fee payment: 13 |
|
26N | No opposition filed |
Effective date: 20180108 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20171206 Year of fee payment: 13 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180105 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20180131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180105 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602006052158 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20190105 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190131 Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190801 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190105 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20060105 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20170405 |